CVE-2019-1880
Vulnerability from cvelistv5
Published
2019-06-05 16:30
Modified
2024-11-21 19:22
Severity ?
EPSS score ?
Summary
Cisco Unified Computing System BIOS Signature Bypass Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Unified Computing System (Managed) |
Version: unspecified < 4.0(4c) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:28:42.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass" }, { "name": "108680", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108680" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1880", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T18:58:15.273798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:22:52.735Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Unified Computing System (Managed)", "vendor": "Cisco", "versions": [ { "lessThan": "4.0(4c)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-07T10:06:02", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass" }, { "name": "108680", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108680" } ], "source": { "advisory": "cisco-sa-20190605-ucs-biossig-bypass", "defect": [ [ "CSCvp12824", "CSCvp12840" ] ], "discovery": "INTERNAL" }, "title": "Cisco Unified Computing System BIOS Signature Bypass Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-06-05T16:00:00-0700", "ID": "CVE-2019-1880", "STATE": "PUBLIC", "TITLE": "Cisco Unified Computing System BIOS Signature Bypass Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Unified Computing System (Managed)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.0(4c)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "4.4", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345" } ] } ] }, "references": { "reference_data": [ { "name": "20190605 Cisco Unified Computing System BIOS Signature Bypass Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass" }, { "name": "108680", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108680" } ] }, "source": { "advisory": "cisco-sa-20190605-ucs-biossig-bypass", "defect": [ [ "CSCvp12824", "CSCvp12840" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1880", "datePublished": "2019-06-05T16:30:23.473763Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-21T19:22:52.735Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-1880\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2019-06-05T17:29:00.647\",\"lastModified\":\"2024-11-21T04:37:36.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la utilidad de actualizaci\u00f3n del BIOS de rack servidores Unified Computing System (UCS) C-Series de Cisco, podr\u00eda permitir a un atacante local autorizado instalar el firmware del BIOS comprometido en un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente del archivo de imagen del firmware. Un atacante podr\u00eda explotar esta vulnerabilidad mediante la ejecuci\u00f3n de la utilidad de actualizaci\u00f3n del BIOS con un conjunto espec\u00edfico de opciones. Una operaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir el proceso de comprobaci\u00f3n de firmas del firmware e instalar el firmware del BIOS comprometido en un dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"C98B6DE4-8759-498A-93CC-B54376EAC099\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c125_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E940DBA-1F06-479A-B697-0070174EB2F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c220_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5502506-02DD-43C8-AED7-847C71AFBBBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c220_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4221A779-1C3C-4EA5-980A-4F9BA206824C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c240_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596E83E7-E11F-4BF7-AF79-C1A5805C0580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c240_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A69A9518-AC5F-440D-A3F1-328035D3157C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\\\\(4l\\\\)\",\"matchCriteriaId\":\"83F54B3E-D792-4971-9EDC-31DA712FAFB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.0\\\\(2g\\\\)\",\"matchCriteriaId\":\"3CD23D8E-C2E3-4C51-9E8C-58DDC810AEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c460_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326CD3F6-3DC3-4840-811F-6ED353DC5F33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:unified_computing_system_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.0\\\\(4c\\\\)\",\"matchCriteriaId\":\"845FBF06-3662-420A-A096-18EE3DEE18C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:unified_computing_system_c480_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E29763-0766-4AEA-A434-37D48B6FAE08\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/108680\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/108680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190605-ucs-biossig-bypass\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.